[OAUTH-WG] ID, MAC and SIG HTTP schemes - starting point for "use a token"

"Manger, James H" <James.H.Manger@team.telstra.com> Tue, 16 February 2010 14:36 UTC

Return-Path: <James.H.Manger@team.telstra.com>
X-Original-To: oauth@core3.amsl.com
Delivered-To: oauth@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 4BEAE3A7AF9 for <oauth@core3.amsl.com>; Tue, 16 Feb 2010 06:36:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.809
X-Spam-Level:
X-Spam-Status: No, score=-1.809 tagged_above=-999 required=5 tests=[AWL=0.085, BAYES_00=-2.599, HELO_EQ_AU=0.377, HOST_EQ_AU=0.327, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DiDwNvDQNBLQ for <oauth@core3.amsl.com>; Tue, 16 Feb 2010 06:36:35 -0800 (PST)
Received: from mailipao.ntcif.telstra.com.au (mailipao.ntcif.telstra.com.au [202.12.233.27]) by core3.amsl.com (Postfix) with ESMTP id C06BD3A77E7 for <oauth@ietf.org>; Tue, 16 Feb 2010 06:36:34 -0800 (PST)
Received: from unknown (HELO mailai.ntcif.telstra.com.au) ([202.12.162.17]) by mailipai.ntcif.telstra.com.au with ESMTP; 17 Feb 2010 01:38:07 +1100
Received: from mail2.cdn.telstra.com.au (localhost [127.0.0.1]) by mailai.ntcif.telstra.com.au (Postfix) with ESMTP id 006FDFF81 for <oauth@ietf.org>; Wed, 17 Feb 2010 01:38:06 +1100 (EST)
Received: from wsmsg3706.srv.dir.telstra.com (wsmsg3706.srv.dir.telstra.com [172.49.40.80]) by mail2.cdn.telstra.com.au (Postfix) with ESMTP id 3FA1841D65 for <oauth@ietf.org>; Wed, 17 Feb 2010 01:37:36 +1100 (EST)
Received: from WSMSG3153V.srv.dir.telstra.com ([172.49.40.159]) by wsmsg3706.srv.dir.telstra.com ([172.49.40.80]) with mapi; Wed, 17 Feb 2010 00:38:06 +1000
From: "Manger, James H" <James.H.Manger@team.telstra.com>
To: "OAuth WG (oauth@ietf.org)" <oauth@ietf.org>
Date: Wed, 17 Feb 2010 00:38:04 +1000
Thread-Topic: ID, MAC and SIG HTTP schemes - starting point for "use a token"
Thread-Index: AcqvFaXASwjv6gNZR/WqH1RJYGzLUw==
Message-ID: <255B9BB34FB7D647A506DC292726F6E1125089AE62@WSMSG3153V.srv.dir.telstra.com>
Accept-Language: en-US, en-AU
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
acceptlanguage: en-US, en-AU
Content-Type: multipart/mixed; boundary="_004_255B9BB34FB7D647A506DC292726F6E1125089AE62WSMSG3153Vsrv_"
MIME-Version: 1.0
Subject: [OAUTH-WG] ID, MAC and SIG HTTP schemes - starting point for "use a token"
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Feb 2010 14:36:37 -0000

Attached is my suggested starting point for the “how to use a token” part of OAuth.



It defines 3 schemes:



Authorization: ID a=”…”    (or in URI or POST)

* quite like WRAP, but with shorter labels, a smidgen of “discovery”, and no explicit tie to OAuth delegation



Authorization: MAC m=”hmac-sha-256” u=”user-id” a=”authz-info” … s=”hgasdag76sa7as”

* a MAC over selected parts of an HTTP request, with a bit of negotiation, and no explicit tie to OAuth delegation



Authorization: SIG m=”rsa…” … s=”hgasjGHfHGFhgFHGfHGFGFghfHdag76sa7as”

* a digital signature over selected parts of an HTTP request, like MAC but with public-key crypto



P.S. It is formatted as an (incomplete) internet-draft since that is what it needs to head to, but it has not be submitted to the IETF draft system.







--

James Manger





> ----------

> From: Eran Hammer-Lahav

> Sent: Friday, 5 February 2010 6:29 PM

> To: OAuth WG (oauth@ietf.org)

> Subject: [OAUTH-WG] Which draft to use as a starting point for 'using a token'?

>

> …

> We have three options for moving forward with 'how to use a token'.

> Start with:

>

> 1. draft-ietf-oauth-authentication

> 2. draft-hammer-http-token-auth

> 3. something else*

> …

> Pick.